MIT's Attack Detection via Super Computing

In a not-too-astounding announcement, it seems MIT Academicians have found a new use for super-computational resources: The utilization of super comuting resources targeting so-called 'compressed bundles' with the ostensible outcome of attack detection. I'll wager there are foreword thinking data scientists bent over the same workwheel using so-called 'Cloud Computing' for the same task (at tenth of a percent of the cost per flop). Just sayin...

'"If you're trying to detect anomalous behavior, by definition that behavior is rare and unlikely," says Vijay Gadepally, a senior staff member at the Lincoln Laboratory Supercomputing Center (LLSC). "If you're sampling, it makes an already rare thing nearly impossible to find."' - via The Lincoln Laboratory at the Masachusetts Institute of Technology

National Cybersecurity Center of Excellence Issues Call for Comments

Earlier this month (in April 2015 if you are reading this post in the far distant future...) the National Institute of Standards and Technology (NIST) released NIST Draft NISTIR 8050; in which, an interesting summary appears of a technical workshop held at Stanford University in conjuction with the Presidents' Cybersecurity Summit.

Pursuant to completeing the draft cycle of the document, the National Cybersecurity Center of Excellence NNCoE (a Center of Excellence and a component of NIST) has issued a Call for Comments, focusing on the content of that document. In this instance, related to your agency, company, buereau, department, country or other organizations' information and/or cybersecurity issues. I've included a link to NISTIR 8050 to assist in fulfilling the Call for Comments. Enjoy.